Today > 5 Critical | 8 High | 34 Medium vulnerabilities   -   You can now download lists of IOCs here!

CVE-2024-41977

Aug. 13, 2024, 12:58 p.m.

CVSS Score

7.1 / 10

Product(s) Impacted

RUGGEDCOM RM1224 LTE(4G) EU

  • < V8.1

RUGGEDCOM RM1224 LTE(4G) NAM

  • < V8.1

SCALANCE M804PB

  • < V8.1

SCALANCE M812-1 ADSL-Router family

  • < V8.1

SCALANCE M816-1 ADSL-Router family

  • < V8.1

SCALANCE M826-2 SHDSL-Router

  • < V8.1

SCALANCE M874-2

  • < V8.1

SCALANCE M874-3

  • < V8.1

SCALANCE M874-3 3G-Router (CN)

  • < V8.1

SCALANCE M876-3

  • < V8.1

SCALANCE M876-4

  • < V8.1

SCALANCE MUM853-1 (A1)

  • < V8.1

SCALANCE MUM853-1 (B1)

  • < V8.1

SCALANCE MUM853-1 (EU)

  • < V8.1

SCALANCE MUM856-1 (A1)

  • < V8.1

SCALANCE MUM856-1 (B1)

  • < V8.1

SCALANCE MUM856-1 (CN)

  • < V8.1

SCALANCE MUM856-1 (EU)

  • < V8.1

SCALANCE MUM856-1 (RoW)

  • < V8.1

SCALANCE S615 EEC LAN-Router

  • < V8.1

SCALANCE S615 LAN-Router

  • < V8.1

Description

A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.1), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.1), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.1), SCALANCE M812-1 ADSL-Router family (All versions < V8.1), SCALANCE M816-1 ADSL-Router family (All versions < V8.1), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.1), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.1), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.1), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.1), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.1), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.1), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.1), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.1), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.1), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.1), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.1), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.1), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.1), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.1), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.1), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.1), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.1), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.1), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.1). Affected devices do not properly enforce isolation between user sessions in their web server component. This could allow an authenticated remote attacker to escalate their privileges on the devices.

Weaknesses

CWE-488
Exposure of Data Element to Wrong Session

The product does not sufficiently enforce boundaries between the states of different sessions, causing data to be provided to, or used by, the wrong session.

CWE ID: 488

Date

Published: Aug. 13, 2024, 8:15 a.m.

Last Modified: Aug. 13, 2024, 12:58 p.m.

Status : Undergoing Analysis

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

productcert@siemens.com

CVSS Data

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

Base Score
7.1
Exploitability Score
1.2
Impact Score
5.9
Base Severity
HIGH
CVSS Vector String

The CVSS vector string provides an in-depth view of the vulnerability metrics.

View Vector String

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

References

https://cert-portal.siemens.com/ productcert@siemens.com